Cybersecurity Awareness Month 2022: Five Disastrous Pitfalls to Avoid at All Costs

Cybersecurity Awareness Month 2022: Five Disastrous Pitfalls to Avoid at All Costs

Security Awareness Training that Won't Put Your Peeps Asleep National Cybersecurity Awareness Month, which takes place every year in October,...
Read More
Prepping for Russian Cyberattacks

Prepping for Russian Cyberattacks

This post is a summary of a full interview about Russian Cyberattacks that John conducted with Bottomline Publications. As Russian...
Read More
Overturning Roe v. Wade Privacy Implications

Overturning Roe v. Wade Privacy Implications

After the supreme court overturned Roe vs. Wade on June 24th, 2022, politics and privacy were turned upside down overnight....
Read More
Did Apple Passkey Just Kill Traditional Passwords?

Did Apple Passkey Just Kill Traditional Passwords?

And Will Passkeys Permanently Marry You to Apple? Humans are weak and so are our passwords. We make easily memorizable...
Read More
Automotive Cybersecurity: Don’t Bank on Untrained “Drivers”

Automotive Cybersecurity: Don’t Bank on Untrained “Drivers”

Would you send your newly licensed 16-year-old out to drive on the interstate without spending months teaching them safety skills...
Read More
Anonymous vs Russia (Ironically) for Ukraine

Anonymous vs Russia (Ironically) for Ukraine

Who thought that Anonymous vs Russia would be the top billing cyber event of the Russian invasion of Ukraine? We...
Read More
Hackers Hot for Hotspots: Protect Your Remote Workforce

Hackers Hot for Hotspots: Protect Your Remote Workforce

Your remote workforce is only as strong as its weakest link — which, believe it or not, may be a...
Read More
Face Computers: Privacy Violation by Pupil Dilation? 

Face Computers: Privacy Violation by Pupil Dilation? 

Smartwatches, holograms, self-driving vehicles — we may have just rung in the year 2022, but here on Earth, we’ve started...
Read More
Ransomware Attacks in 2022: What You Need to Know

Ransomware Attacks in 2022: What You Need to Know

Every company is vulnerable to cyber attack — and I mean every company, small and large. Are you responsible for...
Read More
Ransomware Attack: What if this were your Billion $ mistake?

Ransomware Attack: What if this were your Billion $ mistake?

No one has ever heard of your company. Let’s call it, COMPANY X. And you like it that way. In...
Read More
New iPhone Setting Stops Apps & Ads from Stalking You (App Tracking Transparency)

New iPhone Setting Stops Apps & Ads from Stalking You (App Tracking Transparency)

Apple App Tracking Transparency is Finally Here! With the release of iOS 14.5, Apple has given us the most powerful...
Read More
Facebook Breach: Zuckerberg Karma & Your Stolen Cell #

Facebook Breach: Zuckerberg Karma & Your Stolen Cell #

The Facebook Breach Might Not Be What You're Thinking How many Facebook user records were just breached? The answer might...
Read More
SolarWinds Hack: What Vladimir Putin Wants Every Business To Ignore

SolarWinds Hack: What Vladimir Putin Wants Every Business To Ignore

Summary of the SolarWinds Hack Russian hackers inserted malicious code into a ubiquitous piece of network-management software (SolarWinds and other...
Read More
Nancy Pelosi Laptop Stolen for Sale to Russia by Capitol Rioter

Nancy Pelosi Laptop Stolen for Sale to Russia by Capitol Rioter

And my prediction about the hidden risk in the capitol riot appears to be coming true... "There are growing concerns that...
Read More
Is WhatsApp Privacy a Big Fat Facebook Lie? What You Need to Know.

Is WhatsApp Privacy a Big Fat Facebook Lie? What You Need to Know.

WhatsApp Privacy: Facebook's New "Data Use" Policy I have been getting a ton of questions on the privacy of your...
Read More
The Massive U.S. Capitol Attack We’re Ignoring

The Massive U.S. Capitol Attack We’re Ignoring

Capitol Attack Could Go Way Beyond a Physical Breach When Trump supporters occupied the US Capitol last week, hundreds of...
Read More

Twitter Hack Reminds Us That David Can Still Fell Goliath

The twitter hack began as a quiet scheme to steal and sell unusual user names, which carry high currency in...
Read More
Were Lebron’s Darkest Secrets Exposed by Hackers?

Were Lebron’s Darkest Secrets Exposed by Hackers?

Grubman Shire Hack: REvil Scores a Blackmail Slam Dunk How much is basketball megastar Lebron James brand worth to hackers? ...
Read More
Don’t Be Naive: Obama/Biden “Twitter Hack” Not What It Seemed

Don’t Be Naive: Obama/Biden “Twitter Hack” Not What It Seemed

I'm betting that the recent Twitter hack of prominent political and celebrity Twitter accounts was politically motivated and nation-state operated....
Read More
Cybersecurity Experts Fight for Your Encryption Rights

Cybersecurity Experts Fight for Your Encryption Rights

Cybersecurity experts and privacy advocates like myself are stepping up to protect strong encryption standards, which are facing an all-out...
Read More
1 2 3 32